In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.

Project Subscriptions

Vendors Products
750-8100 Subscribe
750-8100 Firmware Subscribe
750-8101 Subscribe
750-8101\/025-000 Subscribe
750-8101\/025-000 Firmware Subscribe
750-8101 Firmware Subscribe
750-8102 Subscribe
750-8102\/025-000 Subscribe
750-8102\/025-000 Firmware Subscribe
750-8102 Firmware Subscribe
750-8202 Subscribe
750-8202\/000-011 Subscribe
750-8202\/000-011 Firmware Subscribe
750-8202\/000-012 Subscribe
750-8202\/000-012 Firmware Subscribe
750-8202\/000-022 Subscribe
750-8202\/000-022 Firmware Subscribe
750-8202\/025-000 Subscribe
750-8202\/025-000 Firmware Subscribe
750-8202\/025-001 Subscribe
750-8202\/025-001 Firmware Subscribe
750-8202\/025-002 Subscribe
750-8202\/025-002 Firmware Subscribe
750-8202\/040-000 Subscribe
750-8202\/040-000 Firmware Subscribe
750-8202\/040-001 Subscribe
750-8202\/040-001 Firmware Subscribe
750-8202 Firmware Subscribe
752-8303\/8000-002 Subscribe
752-8303\/8000-002 Firmware Subscribe
762-4101 Subscribe
762-4101 Firmware Subscribe
762-4102 Subscribe
762-4102 Firmware Subscribe
762-4103 Subscribe
762-4103 Firmware Subscribe
762-4104 Subscribe
762-4104 Firmware Subscribe
762-4201\/8000-001 Subscribe
762-4201\/8000-001 Firmware Subscribe
762-4202\/8000-001 Subscribe
762-4202\/8000-001 Firmware Subscribe
762-4203\/8000-001 Subscribe
762-4203\/8000-001 Firmware Subscribe
762-4204\/8000-001 Subscribe
762-4204\/8000-001 Firmware Subscribe
762-4205\/8000-001 Subscribe
762-4205\/8000-001 Firmware Subscribe
762-4205\/8000-002 Subscribe
762-4205\/8000-002 Firmware Subscribe
762-4206\/8000-001 Subscribe
762-4206\/8000-001 Firmware Subscribe
762-4206\/8000-002 Subscribe
762-4206\/8000-002 Firmware Subscribe
762-4301\/8000-002 Subscribe
762-4301\/8000-002 Firmware Subscribe
762-4302\/8000-002 Subscribe
762-4302\/8000-002 Firmware Subscribe
762-4303\/8000-002 Subscribe
762-4303\/8000-002 Firmware Subscribe
762-4304\/8000-002 Subscribe
762-4304\/8000-002 Firmware Subscribe
762-4305\/8000-002 Subscribe
762-4305\/8000-002 Firmware Subscribe
762-4306\/8000-002 Subscribe
762-4306\/8000-002 Firmware Subscribe
762-5203\/8000-001 Subscribe
762-5203\/8000-001 Firmware Subscribe
762-5204\/8000-001 Subscribe
762-5204\/8000-001 Firmware Subscribe
762-5205\/8000-001 Subscribe
762-5205\/8000-001 Firmware Subscribe
762-5206\/8000-001 Subscribe
762-5206\/8000-001 Firmware Subscribe
762-5303\/8000-002 Subscribe
762-5303\/8000-002 Firmware Subscribe
762-5304\/8000-002 Subscribe
762-5304\/8000-002 Firmware Subscribe
762-5305\/8000-002 Subscribe
762-5305\/8000-002 Firmware Subscribe
762-5306\/8000-002 Subscribe
762-5306\/8000-002 Firmware Subscribe
762-6201\/8000-001 Subscribe
762-6201\/8000-001 Firmware Subscribe
762-6202\/8000-001 Subscribe
762-6202\/8000-001 Firmware Subscribe
762-6203\/8000-001 Subscribe
762-6203\/8000-001 Firmware Subscribe
762-6204\/8000-001 Subscribe
762-6204\/8000-001 Firmware Subscribe
762-6301\/8000-002 Subscribe
762-6301\/8000-002 Firmware Subscribe
762-6302\/8000-002 Subscribe
762-6302\/8000-002 Firmware Subscribe
762-6303\/8000-002 Subscribe
762-6303\/8000-002 Firmware Subscribe
762-6304\/8000-002 Subscribe
762-6304\/8000-002 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21219 In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 01 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-05-01T19:17:39.712Z

Reserved: 2021-06-10T19:19:08.023Z

Link: CVE-2021-34569

cve-icon Vulnrichment

Updated: 2024-08-04T00:12:50.524Z

cve-icon NVD

Status : Modified

Published: 2022-11-09T16:15:12.433

Modified: 2024-11-21T06:10:43.180

Link: CVE-2021-34569

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses